{"id":2243,"date":"2025-04-25T07:05:44","date_gmt":"2025-04-25T04:05:44","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/"},"modified":"2025-04-25T07:05:44","modified_gmt":"2025-04-25T04:05:44","slug":"encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/","title":{"rendered":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>Samba is a powerful software suite that allows for file and print sharing between different operating systems, notably between Linux and Windows. One of the significant enhancements introduced in Samba 4.0 and later versions is support for SMB 3.0, which includes various security features like encryption of shared files during transmission. In this article, we will walk you through the steps to encrypt Samba shares using SMB 3.0. <\/p>\n<p><\/p>\n<h3>Prerequisites<\/h3>\n<p><\/p>\n<p>Before we get started, ensure you have the following:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>A Linux server with Samba installed (version 4.0 or higher).<\/li>\n<p><\/p>\n<li>Basic familiarity with the Linux command line.<\/li>\n<p><\/p>\n<li>Root or sudo access to install and configure packages.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Step 1: Install Samba<\/h3>\n<p><\/p>\n<p>If you haven\u2019t installed Samba yet, you can do so with the following commands based on your Linux distribution:<\/p>\n<p><\/p>\n<p><strong>For Ubuntu\/Debian:<\/strong><\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt update<br \/>\nsudo apt install samba<\/code><\/pre>\n<p><\/p>\n<p><strong>For CentOS\/RHEL:<\/strong><\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo yum install samba samba-client samba-common<\/code><\/pre>\n<p><\/p>\n<h3>Step 2: Configure Samba<\/h3>\n<p><\/p>\n<p>After installing Samba, you need to configure its settings. Open the Samba configuration file:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/samba\/smb.conf<\/code><\/pre>\n<p><\/p>\n<h3>Step 3: Set Up a Share<\/h3>\n<p><\/p>\n<p>Inside the <code>smb.conf<\/code> file, add a new share definition. Below is an example configuration for a share named <code>encrypted_share<\/code>:<\/p>\n<p><\/p>\n<pre><code class=\"language-ini\">[encrypted_share]<br \/>\n   path = \/srv\/samba\/encrypted<br \/>\n   valid users = @sambashare<br \/>\n   read only = no<br \/>\n   browsable = yes<br \/>\n   create mask = 0775<br \/>\n   directory mask = 0775<br \/>\n   vfs object = stream<br \/>\n   stream support = yes<br \/>\n   smb encrypt = required<\/code><\/pre>\n<p><\/p>\n<h3>Step 4: Create the Share Directory<\/h3>\n<p><\/p>\n<p>Next, create the directory for the Samba share and set the appropriate permissions:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo mkdir -p \/srv\/samba\/encrypted<br \/>\nsudo chown :sambashare \/srv\/samba\/encrypted<br \/>\nsudo chmod 0775 \/srv\/samba\/encrypted<\/code><\/pre>\n<p><\/p>\n<h3>Step 5: Create Samba User<\/h3>\n<p><\/p>\n<p>If you do not have a user for this share, you can add a new user. Make sure the user exists on the Linux system and is part of the <code>sambashare<\/code> group:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo useradd -M sambauser -G sambashare<br \/>\nsudo passwd sambauser<br \/>\nsudo smbpasswd -a sambauser<\/code><\/pre>\n<p><\/p>\n<h3>Step 6: Restart Samba Service<\/h3>\n<p><\/p>\n<p>After making changes, restart the Samba service to apply the new configuration:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo systemctl restart smbd<\/code><\/pre>\n<p><\/p>\n<h3>Step 7: Connect to the Share<\/h3>\n<p><\/p>\n<p>Now that Samba is configured, you can connect to the share using a Windows machine. Open <code>File Explorer<\/code> and enter the following in the address bar:<\/p>\n<p><\/p>\n<pre><code>\\\\your_server_ip\\encrypted_share<\/code><\/pre>\n<p><\/p>\n<p>Replace <code>your_server_ip<\/code> with the actual IP address of your Samba server. When prompted, enter the credentials for the Samba user you created.<\/p>\n<p><\/p>\n<h3>Step 8: Verify Encryption<\/h3>\n<p><\/p>\n<p>To verify that encryption is enabled, you can use tools like Wireshark to capture the traffic between the client and server. Look for the SMB traffic; if encryption is being used, the SMB packets will be encrypted and unreadable.<\/p>\n<p><\/p>\n<h3>Additional Configuration Tips<\/h3>\n<p><\/p>\n<ul><\/p>\n<li>\n<p><strong>SMB Encryption Policies:<\/strong> You can modify the encryption policies with the <code>smb encrypt<\/code> option in the Samba configuration file. The options available include <code>off<\/code>, <code>desired<\/code>, and <code>required<\/code>. Set it according to your security needs:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><code>off<\/code>: No encryption.<\/li>\n<p><\/p>\n<li><code>desired<\/code>: Encrypt if the client requests it.<\/li>\n<p><\/p>\n<li><code>required<\/code>: Encryption is mandatory.<\/li>\n<p>\n<\/ul>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Performance Considerations:<\/strong> While encryption adds a necessary layer of security, it may incur a performance overhead. Testing in a controlled environment before deploying to production is advisable.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Backup Configuration:<\/strong> Before making changes to your Samba configuration, always back up the original configuration file to quickly revert if needed.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Conclusion<\/h3>\n<p><\/p>\n<p>With the increasing need for secure file sharing across the networks, leveraging SMB 3.0 encryption in Samba can significantly enhance the protection of sensitive data. By following the steps outlined in this guide, you can set up encrypted Samba shares that safeguard your data from unauthorized access and eavesdropping.<\/p>\n<p><\/p>\n<p>Feel free to leave your comments below or share your experiences with encrypting Samba shares!<\/p>\n<p><\/p>\n<h3>Related Resources<\/h3>\n<p><\/p>\n<ul><\/p>\n<li><a href=\"https:\/\/www.samba.org\/samba\/docs\/current\/man-html\/smb.conf.5.html\">Samba Official Documentation<\/a><\/li>\n<p><\/p>\n<li><a href=\"https:\/\/www.wireshark.org\/download.html\">Wireshark Download<\/a><\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>Now that you know how to encrypt your Samba shares, secure your file transfers effectively! Happy sharing!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Samba is a powerful software suite that allows for file and print sharing between different operating systems, notably between Linux and Windows. One of the significant enhancements introduced in Samba 4.0 and later versions is support for SMB 3.0, which includes various security features like encryption of shared files during transmission. In this article, we [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2244,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[398,233,641,642,820,279],"class_list":["post-2243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-encrypting","tag-guide","tag-samba","tag-shares","tag-smb","tag-stepbystep","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0\" \/>\n<meta property=\"og:description\" content=\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-25T04:05:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0\",\"datePublished\":\"2025-04-25T04:05:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/\"},\"wordCount\":519,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png\",\"keywords\":[\"Encrypting\",\"Guide\",\"Samba\",\"Shares\",\"SMB\",\"StepbyStep\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/\",\"name\":\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png\",\"datePublished\":\"2025-04-25T04:05:44+00:00\",\"description\":\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server encrypting Samba shares with SMB 3.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 - WafaTech Blogs","description":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/","og_locale":"en_US","og_type":"article","og_title":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0","og_description":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-04-25T04:05:44+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0","datePublished":"2025-04-25T04:05:44+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/"},"wordCount":519,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png","keywords":["Encrypting","Guide","Samba","Shares","SMB","StepbyStep"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/","name":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png","datePublished":"2025-04-25T04:05:44+00:00","description":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0 %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png","width":1024,"height":1024,"caption":"linux server encrypting Samba shares with SMB 3.0"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/encrypting-samba-shares-a-step-by-step-guide-to-using-smb-3-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Encrypting Samba Shares: A Step-by-Step Guide to Using SMB 3.0"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Encrypting-Samba-Shares-A-Step-by-Step-Guide-to-Using-SMB-30.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2243"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2244"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}